loader from loading.io

Russian State Hackers Go After IoS Devices

Cybersecurity Today

Release Date: 03/30/2026

Fortinet EMS Zero-Day, Anthropic’s AI Finds Thousands of Bugs, Iranian Hackers Target US ICS show art Fortinet EMS Zero-Day, Anthropic’s AI Finds Thousands of Bugs, Iranian Hackers Target US ICS

Cybersecurity Today

Fortinet EMS Zero-Day Exploited, Anthropic’s AI Finds Thousands of Bugs, and Iranian Hackers Target US ICS Cybersecurity Today  would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale.  You can find them at Meter.com/cst Host David Shipley reports Fortinet issued emergency hotfixes for a new actively exploited FortiClient EMS unauthenticated RCE zero-day (CVE-2026-35616) affecting 7.4.0.5/7.4.0.6, with over 2,000 exposed...

info_outline
North Korea’s $285M Crypto Heist,  China Breaches FBI System, Delve Faces New Allegations show art North Korea’s $285M Crypto Heist, China Breaches FBI System, Delve Faces New Allegations

Cybersecurity Today

Host David Shiple covers major cybersecurity news: investigators attribute a record $285 million April 1 hack of crypto platform Drift Protocol to North Korea, describing a three-week setup involving a fake “Carbon Vote Token,” wash trading to inflate value, social engineering to pre-approve backdoored transactions, Drift’s removal of a timelock, and rapid collateralized withdrawals that crashed Drift’s token and are now tracked by TRM Labs; the report notes North Korea’s 2025 crypto theft total of $2.5B and lifetime total surpassing $7B after this incident, alongside mention of a...

info_outline
Electric Vehicles and EV Security - Steve Visconti CEO of Xiid Corporation with David Shipley show art Electric Vehicles and EV Security - Steve Visconti CEO of Xiid Corporation with David Shipley

Cybersecurity Today

EV Charging Infrastructure Security: How Hackers Could Disrupt Chargers, Networks, and the Grid Cybersecurity Today  would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale.  You can find them at Meter.com/cst In this holiday weekend edition of Cybersecurity Today, Jim Love introduces David Shipley’s interview with Steve Visconti, CEO of Xiid Corporation, about cybersecurity risks in electric vehicle (EV) charging...

info_outline
Cisco Breached: Source Code Stolen - Cybersecurity Today show art Cisco Breached: Source Code Stolen - Cybersecurity Today

Cybersecurity Today

Cisco Source Code Stolen in Trivy Fallout, Axios Supply Chain Attack, and Active Exploitation of Fortinet and Citrix Flaws David Shipley reports multiple major security incidents: attackers used credentials stolen in the Trivy supply-chain attack via a malicious GitHub action to breach Cisco’s internal development environment, clone 300+ GitHub repos, steal source code (including AI products) and AWS keys, and impact customer-related code; Cisco contained the breach, re-imaged systems, and rotated credentials. A separate supply-chain attack hit the widely used JavaScript library Axios after...

info_outline
Russian State Hackers Go After IoS Devices show art Russian State Hackers Go After IoS Devices

Cybersecurity Today

Mac Malware ‘Infinity Stealer,’ DarkSword iOS Exploits, China Telecom Espionage & TeamTNT Supply Chain Hits Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them at Meter.com/cst David Shipley reports from Seoul on major threats: Malwarebytes details Infinity Stealer, a new macOS info-stealer delivered via “ClickFix” social engineering and built as a compiled Python payload (Nuitka) that...

info_outline
RSAC Recap: Agentic AI and Interview With Commvault CISO Bill O'Connell show art RSAC Recap: Agentic AI and Interview With Commvault CISO Bill O'Connell

Cybersecurity Today

RSAC Recap: Agentic AI Takes Over, Security Funding Shifts, and Why CISOs Must Focus on Resilience Cybersecurity Today  would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale.  You can find them at Meter.com/cst Jim Love and co-host David Shipley recap the RSA Conference in San Francisco, noting that “zero trust” marketing has faded and “agentic AI” (especially “agentic SOC”) dominated vendor messaging. David...

info_outline
Anonymous Tip System Breach May Expose Tipsters show art Anonymous Tip System Breach May Expose Tipsters

Cybersecurity Today

Anonymous Tip System Breach Exposes Millions of Records, Google Warns Q-Day by 2029, and New AI Documentation Supply-Chain Risks Cybersecurity Today  would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale.  You can find them at Meter.com/cst Jim Love reports that a breach at P3 Global Intel, whose tip-submission systems are used by police, government agencies, and schools, allegedly exposed over 8 million submissions including...

info_outline
RSAC Presenter Says RSAC Presenter Says "Time to Kill One of Cybersecurity's Most Overworked Terms"

Cybersecurity Today

RSAC: Retiring “APT,” FCC’s US-Made Router Ban, Zoom Call Scraping, Iran-Targeting Wiper, and Cyber Terrorism Insurance From RSAC 2026, host David Shipley highlights ESET researcher Robert Lipowsky’s argument to retire the overused “advanced persistent threat” label and instead describe actors by motivation and activity, noting blurred lines between nation-state and criminal tooling. He also reports RSAC vendor trends (zero trust fading, “agentic AI” everywhere) and standout booth themes. In Washington, the FCC bans authorization of any new Wi‑Fi router models not made in the...

info_outline
Startup Accused Of Helping Fake Privacy and Security Audits show art Startup Accused Of Helping Fake Privacy and Security Audits

Cybersecurity Today

Compliance Startup Audit-Faking Claims, Trivy Supply-Chain Backdoor, Russia Targets Signal/WhatsApp, and Iran-Linked Stryker Disruption Cybersecurity Today  would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale.  You can find them at Meter.com/cst This episode covers allegations that Y Combinator-backed compliance startup Delve helped customers fake privacy and security audits by generating fabricated evidence that auditors...

info_outline
The Fundamental Mistake in Cybersecurity Risk Management show art The Fundamental Mistake in Cybersecurity Risk Management

Cybersecurity Today

Cybersecurity Isn’t Managing Risk—It’s Managing Threats... And That's the Problem Host David Shipley speaks with Jeff Gardiner, a former university CISO and now at Morgan Stanley, about Gardiner’s doctoral research arguing that cybersecurity has structurally misclassified “risk management” as threat management.  Gardiner explains that real risk is an expected loss calculation (impact × likelihood), while many cybersecurity frameworks and training emphasize vulnerabilities, exploitability, and system configuration without likelihood or business impact. He describes examples...

info_outline
 
More Episodes

Mac Malware ‘Infinity Stealer,’ DarkSword iOS Exploits, China Telecom Espionage & TeamTNT Supply Chain Hits

Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them at Meter.com/cst

David Shipley reports from Seoul on major threats: Malwarebytes details Infinity Stealer, a new macOS info-stealer delivered via “ClickFix” social engineering and built as a compiled Python payload (Nuitka) that steals browser credentials, Keychain data, crypto wallets, and developer secrets while notifying attackers via Telegram. Proofpoint links Russia-aligned TA446 (Cold River/Star Blizzard) to spear-phishing using the DarkSword iOS exploit kit to deliver GhostBlade, with DarkSword now leaked on GitHub and Apple pushing unusual on-device warnings for vulnerable iOS versions. Rapid7 describes China-linked “Red Menshen” using the kernel-level BPFdoor backdoor to persist in global telecom networks. TeamTNT compromises the Telnyx PyPI package with WAV-steganography payloads that steal secrets and target Kubernetes. Iran-linked activity includes a symbolic FBI director email breach and escalating, deliberate healthcare disruption via attacks on Stryker and a Pay2Key incident.

00:00 Show Intro and Sponsor
00:53 Mac ClickFix Stealer
03:25 Dark Sword iOS Exploits
06:30 China Telecom Backdoor
08:47 TeamTNT PyPI Supply Chain
12:20 Iran Cyber and Healthcare
17:41 Wrap Up and Thanks
18:43 Sponsor Message